{"api_version":"1","generated_at":"2026-04-23T07:00:59+00:00","cve":"CVE-2023-32410","urls":{"html":"https://cve.report/CVE-2023-32410","api":"https://cve.report/api/cve/CVE-2023-32410.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32410","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32410"},"summary":{"title":"CVE-2023-32410","description":"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An app may be able to leak sensitive kernel state.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-06-23 18:15:00","updated_at":"2023-07-27 04:15:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213758","name":"https://support.apple.com/en-us/HT213758","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213759","name":"https://support.apple.com/en-us/HT213759","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213760","name":"https://support.apple.com/en-us/HT213760","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.7 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213765","name":"https://support.apple.com/en-us/HT213765","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.7.6 and iPadOS 15.7.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32410","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32410","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32410","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32410","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32410","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-32410","qid":"378504","title":"Apple macOS Monterey 12.6.6 Not Installed (HT213759)"},{"cve":"CVE-2023-32410","qid":"378505","title":"Apple macOS Ventura 13.4 Not Installed (HT213758)"},{"cve":"CVE-2023-32410","qid":"378506","title":"Apple macOS Big Sur 11.7.7 Not Installed (HT213760)"},{"cve":"CVE-2023-32410","qid":"610479","title":"Apple iOS 15.7.6 and iPadOS 15.7.6 Security Update Missing (HT213765)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32410","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An app may be able to leak sensitive kernel state."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An app may be able to leak sensitive kernel state"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"13.4"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"15.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213758","refsource":"MISC","name":"https://support.apple.com/en-us/HT213758"},{"url":"https://support.apple.com/en-us/HT213759","refsource":"MISC","name":"https://support.apple.com/en-us/HT213759"},{"url":"https://support.apple.com/en-us/HT213765","refsource":"MISC","name":"https://support.apple.com/en-us/HT213765"},{"url":"https://support.apple.com/en-us/HT213760","refsource":"MISC","name":"https://support.apple.com/en-us/HT213760"}]}},"nvd":{"publishedDate":"2023-06-23 18:15:00","lastModifiedDate":"2023-07-27 04:15:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.7.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.6.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}